Determine whether to use the Secure Access Module to direct end user internet traffic to the Internet Access Gateway.
Zero Trust Secure Access Internet Access provides you the option of using an installed
module
on end-user devices or alternative authentication methods to transfer internet traffic
to your
Internet Access Gateway, which takes actions based on your Internet Access rules.
Access Type
|
Description
|
Benefits
|
With the Secure Access Module |
Installed on end-user devices and integrated with your IAM solution, the module transfers
connection attempts to the Internet Access Gateway that enforces Internet Access Control
rules
|
|
Without the Secure Access Module
|
Using PAC files, proxy chaining, or port forwarding forwards your end-user traffic
to the
Internet Access Gateway that enforces Internet Access Control rules
|
|